A Tox-based instant messaging and video chat client.
-
Updated
Nov 27, 2024 - C
A Tox-based instant messaging and video chat client.
This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, tools, techniques, programming/scripting notes, and more. I documented them in this repo to provide like-minded offensive security enthusiasts and professionals easy access to these valuable resources.
Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
Misr: The Ultimate Vulnerability Scanner
本地搭建乌云漏洞镜像与乌云知识库所需相关资源文件,分别对Github中的乌云漏洞和乌云知识库做了简单更改,实现图片本地化,以及记录你学习过的漏洞或者知识,,网络安全技术爱好者与白帽子入门学习必备工具集!
HashDown1.0 is an offline security tool used to generate different types of hashes and also know the hash type of a hashed string.
A tool to scan your local network for IoT devices and checks for known vulnerabilities using the CVE database.
A sniffing attack involves the illegal extraction of unencrypted data by capturing network traffic through packet sniffers. In this tool, the user will be given 4 options such as raw, summary, target, and host. The user can select any option and they can start sniffing the network. The user has to just enter the name of the interface.
ICS Security Tools, Tips and Trade for CyberSecurity.
Discover the power of Mech, an automated solution designed to supercharge penetration testing workflows.
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
Denum is a tool designed for the reconnaissance phase of penetration testing and is especially valuable for bug bounty hunters. It helps in gathering and cleaning domain names from URLs to extend the scope of their search by efficiently extracting and standardizing core domain names and subdomains.
Add a description, image, and links to the securitytools topic page so that developers can more easily learn about it.
To associate your repository with the securitytools topic, visit your repo's landing page and select "manage topics."